CYSETS

Entry 3

Ricardo Corpus

6/2/2024

Cyber technology has totally transformed the workplace, but it’s also opened up a lot of ways for people to mess around and break the rules. The vast access to information and systems it provides can tempt employees to misuse resources, commit fraud, or even engage in data theft. The anonymity of online interactions can lead to inappropriate behaviors like sending offensive emails or cyberbullying coworkers. The rise of remote work, thanks to cyber tech, means less direct supervision, making it easier for employees to slack off, misreport work hours, or use company assets for personal projects. This physical separation also complicates managers’ ability to monitor behavior, increasing the potential for misconduct. Cyber technology makes it simpler for disgruntled employees to sabotage company systems or steal sensitive data, causing operational disruptions and harming the company’s reputation. Social engineering and phishing attacks become more prevalent as cybercriminals exploit employees to gain unauthorized access to confidential information or install malware, leading to significant security breaches. Misuse of digital platforms for harassment can create a toxic work environment, and the sense of anonymity can embolden perpetrators. Plus, cyber tech makes it easier to create fake credentials or documents, which helps people pull off fraudulent activities. The ability to manipulate digital records or engage in financial fraud without getting caught right away is a huge problem. Companies need to step up with strong cybersecurity measures, thorough employee training, and effective monitoring systems to keep these risks in check. It’s crucial to build a culture of integrity and vigilance, where employees know about the potential for cyber deviance and are equipped to handle it responsibly. By staying proactive and informed, organizations can enjoy the benefits of cyber technology while minimizing its downsides. Encouraging ethical behavior, promoting transparency, and setting clear policies on the use of tech are essential steps. Regular audits and using advanced security technologies can also help spot and stop deviant behaviors early. Balancing the advantages of cyber technology with tight oversight and a strong ethical framework is key to keeping a secure and productive workplace.

Entry 2

Ricardo Corpus

5/23/2024

When storing electronic information about individuals, several ethical issues arise that must be carefully managed. First, privacy concerns are paramount. Storing personal data without adequate safeguards can lead to unauthorized access and misuse of sensitive information. This is particularly significant as vulnerabilities, such as unpatched applications or weak password management, can be exploited by threat agents. Second, data security is crucial to prevent breaches that expose personal information. Implementing robust access control mechanisms and encryption is essential to protect data integrity and confidentiality. Third, consent and transparency are ethical imperatives. Individuals must be informed about what data is being collected, how it will be used, and who will have access to it. Fourth, data accuracy and misuse pose ethical challenges. Incorrect or outdated information can harm individuals, and the data should not be used for purposes other than those explicitly consented to by the data subjects.

Comparing cybersecurity risks between the U.S. and another country, such as Ukraine, reveals both commonalities and differences. In the U.S., threats often include sophisticated cyber-attacks like the BlackEnergy malware, which has compromised numerous ICS environments, highlighting vulnerabilities in critical infrastructure. The 2015 Ukraine cyberattack, on the other hand, demonstrated how cyber threats could manipulate SCADA systems to cause widespread power outages. Both countries face threats from state-sponsored actors, but the geopolitical context can influence the nature and impact of these threats. For instance, U.S. infrastructure is targeted by diverse actors, including international gangs and terrorists, necessitating a multifaceted defense strategy involving governance and real-time attack detection. Ukraine’s experiences underscore the importance of securing ICS and SCADA networks against similar advanced threats.

Entry 1

Ricardo Corpus

5/18/2024

I am interested in cybersecurity technology because it plays a critical role in protecting our digital world. Specifically, the areas of encryption and intrusion detection systems captivate me. Encryption ensures that sensitive information remains secure and accessible only to authorized parties, which is fundamental in our data-driven society. Intrusion detection systems are vital for identifying and responding to potential security threats in real-time, helping to prevent data breaches and cyber attacks. These technologies are essential for maintaining the integrity and security of digital systems, and my interest lies in understanding and improving these mechanisms to enhance overall cybersecurity.

  1. Computer Science:
    Computer Science is directly related to cybersecurity, providing the foundational knowledge in programming, algorithms, and systems architecture. Understanding how software and hardware function is crucial for developing secure systems and implementing effective security measures. Courses in cryptography, network security, and system vulnerabilities directly contribute to a comprehensive cybersecurity education .
  2. Electrical and Computer Engineering:
    This major focuses on the design and development of electronic systems and computers, which are integral to cybersecurity. Knowledge in this field is essential for understanding the hardware aspects of security, such as secure chip design and hardware encryption. Engineers with this background can develop robust security solutions at the hardware level, enhancing the overall security posture of systems .
  3. Information Technology:
    Information Technology (IT) covers the management and operation of computer systems and networks, making it highly relevant to cybersecurity. IT professionals are often on the front lines of implementing and managing security measures, such as firewalls, intrusion detection systems, and security policies. A solid IT foundation is essential for practical cybersecurity applications and management .
  4. Criminal Justice:
    Criminal Justice provides an understanding of the legal and ethical aspects of cybersecurity. Professionals in this field study cybercrime, digital forensics, and the impact of cyber attacks on society. This major complements cybersecurity by offering insights into the investigative and prosecutorial processes related to cyber incidents, helping bridge the gap between technical solutions and legal frameworks.